Search Results

There are 8523 results for: content related to: Protocol Derivation System for the Needham–Schroeder family

  1. Chaotic modulation-based spread spectrum communication using complex dynamics of chaotic DC–DC current mode controlled boost converter

    Security and Communication Networks

    Volume 6, Issue 9, September 2013, Pages: 1053–1063, Manish Kumar Thukral and Karma Sonam Sherpa

    Article first published online : 10 DEC 2012, DOI: 10.1002/sec.665

  2. Quantifying the effects of vegetation structure on snow accumulation and ablation in mixed-conifer forests

    Ecohydrology

    P. D. Broxton, A. A. Harpold, J. A. Biederman, P. A. Troch, N. P. Molotch and P. D. Brooks

    Article first published online : 14 OCT 2014, DOI: 10.1002/eco.1565

  3. A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Article first published online : 30 MAY 2013, DOI: 10.1002/sec.720

  4. Blind detection of spread spectrum flow watermarks

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 257–274, Weijia Jia, Fung Po Tso, Zhen Ling, Xinwen Fu, Dong Xuan and Wei Yu

    Article first published online : 17 MAY 2012, DOI: 10.1002/sec.540

  5. Client cloud Web service: reducing traffic consumption

    Security and Communication Networks

    Jung Ha Paik, Kwantae Cho, Boo Geum Jung and Dong Hoon Lee

    Article first published online : 5 JUN 2012, DOI: 10.1002/sec.544

  6. Introducing proxy zero-knowledge proof and utilization in anonymous credential systems

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 161–172, Hoda Jannati, Mahmoud Salmasizadeh, Javad Mohajeri and Amir Moradi

    Article first published online : 18 APR 2012, DOI: 10.1002/sec.543

  7. A two-dimensional random projected minutiae vicinity decomposition-based cancellable fingerprint template

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1691–1701, Zhe Jin, Bok-Min Goi, Andrew Teoh and Yong Haur Tay

    Article first published online : 19 AUG 2013, DOI: 10.1002/sec.865

  8. Information geometric security analysis of differential phase-shift quantum key distribution protocol

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 129–150, Laszlo Gyongyosi and Sandor Imre

    Article first published online : 19 JUN 2012, DOI: 10.1002/sec.542

  9. A secure mobility support scheme for 6LoWPAN wireless sensor networks

    Security and Communication Networks

    Volume 7, Issue 3, March 2014, Pages: 641–652, Xiaonan Wang and Yi Mu

    Article first published online : 21 MAR 2013, DOI: 10.1002/sec.765

  10. A graph-theoretic framework for isolating botnets in a network

    Security and Communication Networks

    Padmini Jaikumar and Avinash C. Kak

    Article first published online : 28 FEB 2012, DOI: 10.1002/sec.500

  11. Intelligent network security assessment with modeling and analysis of attack patterns

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1471–1486, Suleyman Kondakci

    Article first published online : 27 JUN 2012, DOI: 10.1002/sec.591

  12. DEFF: a new architecture for private online social networks

    Security and Communication Networks

    Volume 6, Issue 12, December 2013, Pages: 1460–1470, Fatemeh Raji, Ali Miri, Mohammad Davarpanah Jazi and Behzad Malek

    Article first published online : 21 MAR 2012, DOI: 10.1002/sec.533

  13. A privacy-preserving acceleration authentication protocol for mobile pay-TV systems

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 361–372, Xuefeng Liu and Yuqing Zhang

    Article first published online : 27 JUN 2012, DOI: 10.1002/sec.584

  14. Efficient privacy-preserving authentication protocol for vehicular communications with trustworthy

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1441–1451, Hu Xiong, Zhong Chen and Fagen Li

    Article first published online : 8 FEB 2012, DOI: 10.1002/sec.515

  15. A new certificateless authenticated key agreement protocol for SIP with different KGCs

    Security and Communication Networks

    Volume 6, Issue 5, May 2013, Pages: 631–643, Xiaowei Li, Yuqing Zhang and Geifei Zhang

    Article first published online : 5 JUL 2012, DOI: 10.1002/sec.595

  16. Predicate encryption for multi-inner-products

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 325–339, Dongdong Sun, Colin Boyd and Juan Manuel Gonzalez Nieto

    Article first published online : 21 JUN 2012, DOI: 10.1002/sec.566

  17. You have free access to this content
    Computational modeling of chemo-electro-mechanical coupling: A novel implicit monolithic finite element approach

    International Journal for Numerical Methods in Biomedical Engineering

    Volume 29, Issue 10, October 2013, Pages: 1104–1133, J. Wong, S. Göktepe and E. Kuhl

    Article first published online : 24 JUN 2013, DOI: 10.1002/cnm.2565

  18. A Method of Readability Assessment for Web Documents Using Text Features and HTML Structures

    Electronics and Communications in Japan

    Volume 97, Issue 10, October 2014, Pages: 1–10, Takahiro Yamasaki and Kin-Ichiroh Tokiwa

    Article first published online : 8 SEP 2014, DOI: 10.1002/ecj.11565

  19. Certificateless broadcast authentication for vehicular ad hoc networks

    Security and Communication Networks

    Volume 6, Issue 5, May 2013, Pages: 602–611, Eun-Kyung Ryu and Kee-Young Yoo

    Article first published online : 27 JUN 2012, DOI: 10.1002/sec.590

  20. Geolocation-aware security in a netcentric small unmanned-aerial-system for RF emitters

    Security and Communication Networks

    Jing Liang

    Article first published online : 21 MAR 2012, DOI: 10.1002/sec.532